SAP Fiori Launchpad (News tile Application), versions - 750,751,752,753,754,755, allows an unauthorized attacker to use SAP Fiori Launchpad News tile Application to send malicious code, to a different end user (victim), because News tile does not sufficiently encode user controlled inputs, resulting in Reflected Cross-Site Scripting (XSS) vulnerability. Information maintained in the victim's web browser can be read, modified, and sent to the attacker. The malicious code cannot significantly impact the victim's browser and the victim can easily close the browser tab to terminate it.
References
Link | Resource |
---|---|
https://launchpad.support.sap.com/#/notes/2984627 | Permissions Required |
https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=562725571 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
Information
Published : 2020-11-13 07:15
Updated : 2020-11-24 13:12
NVD link : CVE-2020-26825
Mitre link : CVE-2020-26825
JSON object : View
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Products Affected
sap
- fiori_launchpad_\(news_tile_application\)